Database Security IX


Book Description

This book documents progress and presents a broad perspective of recent developments in database security. It also discusses in depth the current state-of-the-art in research in the field. A number of topics are explored in detail including: current reseearch in database security and the state of security controls in present commercial database systems. Database Security IX will be essential reading for advanced students working in the area of database security research and development in for industrial researchers in this technical area.




Data and Application Security


Book Description

New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the whole of society. Data and Applications Security covers issues related to security and privacy of information in a wide range of applications, including: Electronic Commerce, XML and Web Security; Workflow Security and Role-based Access Control; Distributed Objects and Component Security; Inference Problem, Data Mining and Intrusion Detection; Language and SQL Security; Security Architectures and Frameworks; Federated and Distributed Systems Security; Encryption, Authentication and Security Policies. This book contains papers and panel discussions from the Fourteenth Annual Working Conference on Database Security, which is part of the Database Security: Status and Prospects conference series sponsored by the International Federation for Information Processing (IFIP). The conference was held in Schoorl, The Netherlands in August 2000.




Computer Security - ESORICS 92


Book Description

This volume presents the proceedings of the second European Symposium on Research in Computer Security (ESORICS 92), held in Toulouse in November 1992. The aim of this symposium is to further the progress of research in computer security by bringing together researchers in this area, by promoting the exchange of ideas with system developers, and by encouraging links with researchers in areas related to computer science, informationtheory, and artificial intelligence. The volume contains 24 papers organizedinto sections on access control, formal methods, authentication, distributed systems, database security, system architectures, and applications. ESORICS 92 was organized by AFCET (Association francaise des sciences et technologies de l'information et des syst mes) in cooperation with a large number of national and international societies and institutes.




Inheritance in a Relational Object-oriented Database System


Book Description

"We describe the relational algebra implementation of all the modifications to the relational operators necessary to accommodate the object-oriented features mentioned above. New syntax is suggested when these modifications are not sufficient." --




Security for Object-Oriented Systems


Book Description

This volume contains papers from the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, held in Washington DC, USA, on 26 September 1993. The workshop addressed the issue of how to introduce an acceptable level of security into object-oriented systems, as the use of such systems becomes increasingly widespread. The topic is approached from two different, but complementary, viewpoints: the incorporation of security into object-oriented systems, and the use of object-oriented design and modelling techniques for designing secure applications. The papers cover a variety of issues, relating to both mandatory and discretionary security, including security facilities of PCTE, information flow control, the design of multilevel secure data models, and secure database interoperation via role translation. The resulting volume provides a comprehensive overview of current work in this important area of research.




Database Security, V


Book Description

This volume presents an in-depth discussion of the current state of research and practice in database security, including a record of discussions concerning that research. It is offered both to document progress and to provide researchers with a broad perspective of recent developments. The volume also contains a preview of coming security issues in medical information systems, and a summary of the IFIP WG 11.3 meeting which was held following the conference. Faculty and advanced students in the area of database security research and development and industrial researchers should find this proceedings volume of interest.




Computer Security - ESORICS 98


Book Description

This book constitutes the refereed proceedings of the 5th European Symposium on Research in Computer Security, ESORICS 98, held in Louvain-la-Neuve, Belgium, in September 1998. The 24 revised full papers presented were carefully reviewed and selected from a total of 57 submissions. The papers provide current results from research and development in design and specification of security policies, access control modelling and protocol analysis, mobile systems and anonymity, Java and mobile code, watermarking, intrusion detection and prevention, and specific threads.




Database Security, VIII


Book Description

The current state of database security research and practice is explored in this volume. Contributions are sourced from a wide range of international specialists involved in the field, ensuring a comprehensive cross-fertilization of ideas. Progress achieved in the following areas is given particular emphasis: user groups and roles; database architecture; inference analysis and control; database models; queries, updates and transactions; policy modelling; access control and application design. Invited papers provide a perspective on the implications of security in health care systems, plus current trends in database technology and their impact on security concepts.




Database Security, II


Book Description

This second volume reports research and development results in the area of database security. Topics discussed include the development of a proper framework for stating database system security requirements, and particularly how the notion of roles can best be applied. The application of object-oriented database systems to enforce security requirements stated in terms of role authorizations appears to be a promising avenue for further work. Characterization and control of the problems of aggregation and inference have also been the subject of considerable effort and some progress. The utility of establishing a common problem framework for testing proposed solutions to database security problems is also recognized. The group tentatively agreed to use a hypothetical database of medical information for this purpose, since this application can involve complex yet intuitive requirements for secrecy, integrity, and availability. Such a database could require controlling access authorizations for a variety of roles including those of patients, doctors, nurses, pharmacists, epidemiological researchers, and insurers. Contents: Policy and Models. Security Models and Enterprise Models (J.E.